ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.Extract from article by Tom Fuhrman
The question then becomes, how do we know when an email is authentic? We can expect to see businesses and government focus on two aspects of information governance around security, both of which apply cryptographic techniques when the information is created. First, there is now an increased incentive to use methods at the point of origination that make it possible to later verify authenticity. Second, more information will be given the quality of nonrepudiation. That is, it will be created in such a way that its originators cannot deny authorship.
Deployment of such technologies will enhance the focus on these aspects of security and wider adoption of these techniques, particularly in government communications.
Read the complete article at Cyber Privacy, Law and Governance in the Spotlight After U.S. Election